2017
DOI: 10.1109/mce.2017.2685019
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 72 publications
(17 citation statements)
references
References 4 publications
0
17
0
Order By: Relevance
“…For example, vulnerabilities in IP cameras had been used to launch the well-known DDoS. Moreover, even if the camera in Figure 1 does not contain any vulnerability, an attacker can also utilize vulnerabilities in the gateway node to redirect the network flow of the camera into an evil Internet node to extract privacy via machine learning [28,29].…”
Section: Typical Iot Networkmentioning
confidence: 99%
“…For example, vulnerabilities in IP cameras had been used to launch the well-known DDoS. Moreover, even if the camera in Figure 1 does not contain any vulnerability, an attacker can also utilize vulnerabilities in the gateway node to redirect the network flow of the camera into an evil Internet node to extract privacy via machine learning [28,29].…”
Section: Typical Iot Networkmentioning
confidence: 99%
“…Security becomes a key requirement for these mission critical environments. Several security solutions involving cryptography exist for IoT and similar applications [4] [5]. Cryptographic solutions are broadly divided into two types: asymmetric cryptography and symmetric cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…One who will collect much amount of such an information may dominate and control, as a ruler, the communications on the IoT network. Many computer scientists have pointed out the risk and damage of cyber-attacks as the IoT network grows [3][4][5][6][7][8][9][10]. There are three kinds of security concerns; Firstly, it is that the of 20 ruler can control everyone's information including a personal privacy.…”
Section: Introductionmentioning
confidence: 99%